For the January meeting of the OWASP Vancouver chapter we have a very interesting presentation from Michael Weider, Founder and CTO of IBM Watchfire. Michael will provide insights into the latest trends in application security, what is the threat and what best practices are companies employing to address this growing threat.

+

== 2012 Meetings ==

+

You can subscribe to the OWASP Vancouver Calendar [https://www.google.com/calendar/ical/osgb36r55fqlt3m10jc4e2ef70%40group.calendar.google.com/public/basic.ics here].

The meeting started with an introduction of the OWASP group and its objectives: goals and projects that OWASP is leading.

+

−

There are various open source projects that the OWASP team has been a part of, namely, the OWASP top ten list of vulnerabilities; CLASP ( a guideline for companies to address security issues in their products ); GOAT ( practice your hacking skills on their machines); Web Scarab; plus other scanning/hacking tools.

+

−

+

−

We then introduced the OWASP Vancouver chapter: lately the chapter has been a little be dormant and all the presents agreed to provide help to revamp the chapter.

+

−

The objective of the OWASP Vancouver chapter is to promote web application security and security awareness in the community.

+

−

+

−

In the fall off 2007 the Vancouver chapter reached into the other Vancouver security and technical groups. Some groups as for example SIG Security and Vantug have been interested to hear more about OWASP and the asked for presentations. More presentation can be done to these groups in the next year. We all agree that reaching into Vancouver groups is an important goal for the OWASP Vancouver chapter.

+

−

+

−

Another goal of the group is to facilitate some technical discussion and presentation on the security field. Some of the topics of interest are the following:

+

−

+

−

* Honeypot;

+

−

* Vulnerabilities;

+

−

* Secure Development LifeCycle;

+

−

* Hands on seminar using various security/pen tools;

+

−

* Wireless security;

+

−

* Http and basic encryption;

+

−

* Forensic;

+

−

* Law and enforcement in security;

+

−

* International security groups like CISSP or SANS.

+

−

+

−

We've also discussed the possibility to promote OWASP in the community and other groups and to capturing new membership through social sites such as Tazzu.com and meetup.com.

+

−

+

−

The next meeting is planned for the end of January

+

−

== OWASP Chapter Meeting May 30th 5:30pm - 7:00pm ==

+

'''Date & Time:''' Monday, May 28th, 2012 @ 5:30pm

−

'''Attendance:'''

+

−

* Neil (PDB Security)

+

−

* Chris (Sxip Identity)

+

−

* Mauro (Business Objects)

+

+

Millions of web users today employ their Facebook accounts to sign into more than one million relying party (RP) websites. This web-based

+

single sign-on (SSO) scheme is enabled by OAuth 2.0, a web resource authorization protocol that has been adopted by major service providers. The OAuth 2.0 protocol has proven secure by several formal methods, but whether it is indeed secure in practice remains an open

+

question. We examine the implementations of three major OAuth identity providers (IdP) (Facebook, Microsoft, and Google) and 96 popular RP

+

websites that support the use of Facebook accounts for login. Our results uncover several critical vulnerabilities that allow an attacker to gain unauthorized access to the victim user's profile and social graph, and impersonate the victim on the RP website. Closer

+

examination reveals that these vulnerabilities are caused by a set of design decisions that trade security for implementation simplicity. To improve the security of OAuth 2.0 SSO systems in real-world settings, we suggest simple and practical improvements to the design and implementation of IdPs and RPs that can be adopted gradually by individual sites.

−

'''Introdcutions'''

+

'''Registration:''' Registration is strongly recommended since an invite will be extended to other groups to try to improve participation in OWASP. If space runs out, preference will be given to those who have registered!

Social Media has taken over the online world; what Microsoft attempted with Passport has been made reality by Facebook, Twitter, Google, and other service providers. In addition to the proprietary identity services these platforms offer, several support protocols such as OpenID, This will be a one hour presentation that will contrast the security and privacy features available in major online identity protocols, and contrast these with Mozilla's BrowserID protocol.

+

+

'''Registration:''' Registration is strongly recommended since an invite will be extended to other groups to try to improve participation in OWASP. If space runs out, preference will be given to those who have registered!

''(Registration details are not retained after the meeting, however a sign-up sheet will be available for those claiming CPEs)''

+

+

'''Location:'''

+

Ping Identity,

+

200 - 788 Beatty St,

+

Vancouver

+

+

'''About Ping Identity

+

'''

+

Ping Identity has generously offered their downtown office space, located on the corner of Beatty and Robson, to host our chapters meetings moving forward. The office is 6000sq/ft of a mostly open floor plan, so we should be able to accommodate a large group.

Revision as of 10:09, 6 August 2013

OWASP Vancouver

Welcome to the Vancouver chapter homepage. The chapter leader is Yvan BoilyClick here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

2012 Meetings

May 2012

OAuth-based single sign-on in Real-world Implementations

Speaker: San-Tsai Sung

Date & Time: Monday, May 28th, 2012 @ 5:30pm

Millions of web users today employ their Facebook accounts to sign into more than one million relying party (RP) websites. This web-based
single sign-on (SSO) scheme is enabled by OAuth 2.0, a web resource authorization protocol that has been adopted by major service providers. The OAuth 2.0 protocol has proven secure by several formal methods, but whether it is indeed secure in practice remains an open
question. We examine the implementations of three major OAuth identity providers (IdP) (Facebook, Microsoft, and Google) and 96 popular RP
websites that support the use of Facebook accounts for login. Our results uncover several critical vulnerabilities that allow an attacker to gain unauthorized access to the victim user's profile and social graph, and impersonate the victim on the RP website. Closer
examination reveals that these vulnerabilities are caused by a set of design decisions that trade security for implementation simplicity. To improve the security of OAuth 2.0 SSO systems in real-world settings, we suggest simple and practical improvements to the design and implementation of IdPs and RPs that can be adopted gradually by individual sites.

Registration: Registration is strongly recommended since an invite will be extended to other groups to try to improve participation in OWASP. If space runs out, preference will be given to those who have registered!

Please register at: here.
(Registration details are not retained after the meeting, however a sign-up sheet will be available for those claiming CPEs)

January 2012

Social Media has taken over the online world; what Microsoft attempted with Passport has been made reality by Facebook, Twitter, Google, and other service providers. In addition to the proprietary identity services these platforms offer, several support protocols such as OpenID, This will be a one hour presentation that will contrast the security and privacy features available in major online identity protocols, and contrast these with Mozilla's BrowserID protocol.

Registration: Registration is strongly recommended since an invite will be extended to other groups to try to improve participation in OWASP. If space runs out, preference will be given to those who have registered!

Please register here.
(Registration details are not retained after the meeting, however a sign-up sheet will be available for those claiming CPEs)

Location:
Ping Identity,
200 - 788 Beatty St,
Vancouver

About Ping Identity
Ping Identity has generously offered their downtown office space, located on the corner of Beatty and Robson, to host our chapters meetings moving forward. The office is 6000sq/ft of a mostly open floor plan, so we should be able to accommodate a large group.